
Don’t miss out
17 Sep 2025
Gaylord Texan Resort & Convention Center
Welcome to CISOXDallas, the premier event exclusively designed for accomplished CISOs across Dallas. Step into the forefront of strategic technology leadership as we navigate the evolving post-pandemic landscape and unlock unparalleled opportunities for enterprise success. Join us at CISOXDallas, where visionary CISOs converge to engage in transformative discussions, gain strategic insights, and address the pressing challenges shaping the world of enterprise technology.
Secure up to twelve exclusive meetings with relevant leads at CISOXDallas maximising your opportunity to forge valuable connections and drive business growth.
Become a sponsorImmerse yourself in thought-provoking discussions, as top leaders share their expertise and provide you with invaluable insights to propel your strategic initiatives forward.
Engage with industry peers, thought-leaders, and solution providers to foster meaningful connections and explore collaborative opportunities that drive innovation and growth.
Discover what awaits you at CISOXDallas.
As digital strategy becomes inseparable from business strategy, the roles of CIOs and CISOs are undergoing a fundamental shift, from operational executors to strategic co-pilots of enterprise transformation. This session explores how today’s technology leaders can redefine their influence by aligning IT and security with board-level priorities, driving agility, growth, and resilience across the organization. We’ll unpack how to break down silos between technology and the business, translate complex technical initiatives into board-relevant insights, and foster shared accountability for digital success across departments. Attendees will gain practical strategies for leading with a “business-first, tech-smart” mindset while navigating the growing intersection of IT, ESG, compliance, and customer experience. It’s time to reframe technology leadership not as a support function, but as a core driver of organizational value.
Most organizations believe their risk assessment programs are effective—until a real attacker proves otherwise. In this session, Ellen Sundra will challenge conventional security approaches by shifting the focus from theoretical risk to real-world exploitability. Drawing from insights gained across 150,000+ pentests, she’ll share compelling war stories that expose hidden attack paths, misconfigured defenses, and critical gaps that traditional security tools miss. Attendees will walk away with a deeper understanding of how an offense-driven defense—thinking like an attacker and continuously testing security—can uncover weaknesses before adversaries do. Discover why organizations that “hack themselves” first are the ones best equipped to defend against today’s relentless cyber threats.
Key Takeaways:
• Risk Assessments That Matter – Move beyond check-the-box security to focus on exploitable risk.
• Attacker’s Perspective – Learn how real attackers chain weaknesses together to achieve critical impact.
• Resilience Through Offense – Build a security strategy that continuously finds, fixes, and verifies vulnerabilities.
• Don’t miss this opportunity to rethink your security approach and learn why “go hack yourself” is the best way to stay ahead of the next breach.
As enterprises accelerate their digital transformation and expand across multiple cloud platforms, maintaining robust security while enabling innovation has become a critical challenge. In this session, Saurabh Srivastava, Director of Hybrid Cloud Security at Hilton, will provide an in-depth look at how Hilton is addressing the complexities of securing a global, multi-cloud environment that includes AWS and Ali Cloud. Saurabh will walk through Hilton’s approach to onboarding, implementing, and operationalizing Cloud Security Posture Management (CSPM) and Cloud-Native Application Protection Platform (CNAPP) solutions—critical tools for improving visibility, reducing misconfigurations, and automating compliance across distributed cloud infrastructures. He will share firsthand lessons from the field, including how to design scalable, automated controls that deliver real-time risk insight while keeping up with the dynamic pace of cloud development. The session will also explore some of the more nuanced and emerging challenges in hybrid cloud security, such as managing and securing ephemeral workloads, integrating AI-driven capabilities into threat detection and response, and navigating the constant tension between developer velocity and policy enforcement. Attendees will leave with practical takeaways, architecture-level insights, and a forward-looking perspective on how to future-proof cloud security strategies in a rapidly evolving threat landscape.
AI is no longer a feature; it’s a strategic foundation. In this session, we’ll discuss how CIOs can lead with an AI-first mindset to modernize cloud environments, enhance operational efficiency, and drive enterprise-wide innovation. From intelligent automation to predictive infrastructure optimization, learn how embedding AI into your cloud transformation strategy can accelerate outcomes, reduce risk, and position IT as a true enabler of business growth.
In this interactive session, our event partners will take the lead in initiating and facilitating conversations centered on challenges and solutions within the industry. Attendees can expect dynamic discussions where diverse perspectives are shared, fostering collaborative problem-solving and the exploration of innovative solutions to common industry hurdles.
As organizations accelerate digital transformation, legacy SAP environments often become bottlenecks to agility, scalability, and, most critically ,cyber resilience. This session explores a strategic roadmap for modernizing SAP infrastructure to meet today’s evolving threat landscape and business demands. Drawing from real-world enterprise experiences, we’ll examine how to transition from traditional on-premise models to hybrid and cloud-native architectures, while embedding security by design. Key focus areas include identity and access modernization, GRC, Zero Trust integration, automation of patching and monitoring, and aligning SAP security with enterprise-wide resilience strategies.
Attendees will gain actionable insights into:
• Identifying and mitigating risks in legacy SAP landscapes
• Leveraging cloud and automation to enhance resilience
• Aligning SAP modernization with broader cybersecurity and business continuity goals
Whether you’re a CIO, CISO, or enterprise architect, this session will help you reimagine SAP not just as a system of record, but as a resilient, secure platform for innovation.
With headlines often screaming about breaches, the modern CISO navigates an insidious reality: the quiet, complex risks that undermine strategic vision and growth. This session cuts through the noise, offering CISOs and senior security leaders a blueprint for genuine organizational strength. We’ll explore indispensable efforts, from rigorous, ecosystem-spanning simulations that stress-test cloud and third-party dependencies, to cultivating a resilient human element within your teams, fostering mastery, and preventing burnout. Discover how to transform inherent risk into enduring, quantifiable resilience, confidently demonstrating the measurable impact of diligent, strategic effort to your board and stakeholders. Learn to ensure your enterprise isn’t just surviving, but thriving, no matter what lies ahead.
Key takeaways include:
• Mastering the Daily Grind: Uncover the consistent practices that build the bedrock of true cyber resilience against evolving threats.
• Proving Quantifiable Readiness: Gain actionable strategies to validate and improve organizational readiness through continuous, real-world simulations.
• Articulating Strategic Impact: Learn to effectively communicate the profound value of ‘The Real Work’ to leadership, transforming diligence into measurable strength and minimizing enterprise risk.
As AI adoption accelerates, the true foundation for success lies in trusted, high-quality data. Lt Col Georgeo Pulikkathara shares how the U.S. Army is transforming its AI strategy by prioritizing data governance, transparency, and continuous validation to ensure robust, explainable, and secure AI systems. Addressing challenges like fragmented data and poor quality, the Army’s approach includes enterprise-wide stewardship, federated learning, and audit-ready model tracking. The result: improved AI performance, reduced false positives, and greater trust from commanders and stakeholders. This session provides practical insights for tech leaders seeking to shift from model-centric to data-centric AI, building systems that are both effective and responsible.
Join Deepak Sachdeva, CIO of the U.S. Air Force, and Fred Clayton, CISO of Akumin, for an enlightening session on how CIOs and CISOs can drive substantial value creation through private equity and strategic investments. Sachdeva brings a unique public-sector perspective, supporting innovation through investments in emerging tech companies like i2i, driving modernization and mission readiness across Air Force operations. Clayton provides a private-sector vantage point: after Akumin’s 2021 acquisition by private equity, the company achieved dramatic financial turnaround, with full-year revenue increasing by 78% to $749.6 million and adjusted earnings before interest, taxes, depreciation, and amortization climbing 115% to $144 million in 2022.
This session will unpack how technology leaders can evaluate and execute strategic investments, align IT and cybersecurity initiatives with broader business goals, and transform their functions into engines of innovation, revenue growth, and long-term value, even amidst complex equity environments.
Key Takeaways:
– How to assess and execute strategic equity investments that foster innovation, whether in-house or via external startups.
– Best practices for aligning IT and security investments with organizational goals to unlock new revenue streams and drive cost efficiency.
– Real-world outcomes: from pilot-stage investments like i2i that seed innovation, to post-acquisition cybersecurity integrations at Akumin that support PE-driven growth.
In early 2025, Tarrant County found itself in the crosshairs of a sophisticated ransomware attack orchestrated by the Medusa cybercrime syndicate. The breach, which impacted the Tarrant Appraisal District’s systems, exposed sensitive data and forced a rapid operational shutdown. Rather than retreat into damage control, Russell Scott, Chief Information Security Officer of Tarrant County, led a bold response that transformed a crisis into a catalyst for long-overdue change. In this session, Russell recounts how his team navigated the immediate threat, working with federal agencies, launching incident containment measures, and addressing ransom demands, while also laying the foundation for long-term resilience. The county responded by investing over $1 million in cloud infrastructure, including the migration to Microsoft Office 365, enhanced backup systems, and proactive threat detection tools. The attack ultimately accelerated a broader modernization effort and positioned Tarrant County as a case study in cyber recovery and innovation. Attendees will gain a behind-the-scenes look at how a public sector organization flipped the narrative, transforming a security breach into an opportunity for reinvention, collaboration, and renewed trust with the community.
AI is rapidly transforming the cyberthreat landscape, with adversaries – from script kiddies to nation-state actors – leveraging AI to scale and automate attacks.
Security operations leaders must adapt, using AI-driven defense strategies to stay ahead. This session explores how organizations can harness AI to enhance detection, response, and resilience. Learn key techniques for integrating AI into security operations, mitigating emerging risks, and ensuring AI works for you – not against you.
Take a break, engage in meetings or join a discussion roundtable! During this PM Power Break, fellow enterprise leaders will guide discussions on their favorite topic, fostering an environment of open exchange, exploration of diverse perspectives and experiences. Attendees can grab a coffee and anticipate engaging conversations through 1-2-1 meetings and roundtables. Conversations will be driven by shared challenges and interests, offering valuable insights and opportunities for collaborative learning and networking.
UNT is one of the nation’s largest public research universities—nearly 47,000 students—and its IT team runs a modern, secure, and scalable campus backbone. When it was time to level up data resiliency, UNT partnered with Veeam to design and deliver an enterprise-grade strategy. Hear directly from Chris Pritchard, CTO and Associate Vice Chancellor for Enterprise Infrastructure, on the challenges they faced, how the partnership worked, and what you can reuse. Expect clear takeaways you can bring back to your team to harden, simplify, and accelerate data resiliency.
In today’s high-stakes digital landscape, IT and Security departments sit at the epicenter of both innovation and risk. Yet, building and retaining the leadership and technical talent required to secure and scale the enterprise is more challenging than ever. From cloud migrations and zero-trust architectures to AI governance and platform modernization, the demand for adaptable, skilled professionals is skyrocketing. But the talent pool isn’t keeping up. This closing keynote panel brings together senior IT and security leaders to address the tough questions: Should we invest in upskilling our internal teams? When does reskilling make sense? And where do we draw the line between insourcing and outsourcing in a threat-driven, resource-constrained environment?
The discussion will cover:
The growing complexity of talent needs in IT and cybersecurity
How to balance internal capability-building with smart external sourcing
Creating sustainable upskilling programs for future-ready teams
Managing burnout, retention, and leadership gaps in hybrid work environments
Gaylord Texan Resort & Convention Center, Gaylord Trail, Grapevine, TX, USA
Gaylord Texan Resort & Convention Center, Gaylord Trail, Grapevine, TX, USA
See what attendees, speakers and sponsors say about our events.
“Interesting agenda, top experts and speakers, expectations were fully met by the participants and presentations. The event was great, vibrant until the end and at a great venue!"
“This is in the Top 5 of my best IT conferences to date, including commercial events. I already recommended EDS to my colleagues."
“I was impressed by all of the speakers and took away some interesting insights from the participants. The CXO team was well organized and made things flow well, definitely higher calibre and the event location / venue was great."
“It was a real value for me to be part of your event. You did a great job in organizing and performing."
“Attending EDS events as a CTO opened doors to insightful discussions and connections that felt truly genuine. It's not often you find such a perfect blend of knowledge sharing and camaraderie."
“Another great event! The atmosphere is relaxed yet intellectually stimulating, making it easy to connect with peers and exchange real-world insights with real CISOs."
“Thank you EDS. Your gatherings are refreshing and I always leave feeling inspired and armed with actionable ideas for our digital strategy."
“Sponsoring EDS events has been a fantastic opportunity for us. The focus on genuine engagement rather than just promotion allows us to build lasting relationships with industry leaders in a natural, authentic way."
“I've been attending EDS dinners as a CIO for a while now, and they never disappoint. The blend of thought-provoking discussions and genuine connections is unmatched in the industry."
“EDS events provide an invaluable platform for CISOs like myself to exchange ideas and best practices in a relaxed, yet professional setting. The conversations are always real and relevant. Thank you EDS team!"
“We're repeat sponsors of EDS dinners for a reason! Each time, we get unique opportunities to connect with decision-makers on a personal level. It's not just about business; it's about building authentic relationships, every time"
“EDS events have become a staple for me as a CDO"
“Sponsoring EDS events has been a breath of fresh air. The focus on quality over quantity ensures that our brand gets genuine exposure to the right audience in a way that feels natural and human."
Attendance is reserved for C-Suite executives and Senior Executives within Cybersecurity, including Chief Information Security Officers, and other senior security decision-makers from a wide array of industries. Joined by our select sponsor partners, enriching networking opportunities and offering cutting-edge solutions.
Thanks to our sponsors, your access is entirely complimentary, providing you with full-day access to all presentations, exclusive networking sessions, personalised one-to-one meetings, delectable catering, and an open bar for added networking.
These 25-minute meetings provide invaluable opportunities to discover new solutions and expand your network with leading innovative providers that can help solve your current or future complex challenges.
Professional business attire is appropriate.
No preparation is needed on your part. We take care of all the final details. Simply arrive at the specified time, date, and location, and we’ll handle the rest to ensure you have a seamless and enjoyable experience.
Our events offer unparalleled experiences where interactive sessions spark innovation, keynotes unveil insights from industry luminaries, and exclusive one-on-one meetings with best-in-breed solution providers unfold in some of the world’s most prestigious venues. This unique format ensures that your challenges are addressed directly, providing invaluable insights, connections, and maximising value for your time. With a compact schedule featuring a variety of presentations, you’ll gain a comprehensive view of the latest innovations and have ample opportunity to network with like-minded peers—all under one roof, and in just one day. This fosters collaboration and forges invaluable connections among executives with a genuine influence, setting the standard for elite gatherings in the industry.
Get in touch here